Lecture 7 Flashcards
Malicious code
A threat that exploits various vulnerability to spread malicious payloads is called what?
Malicious code
People who are extremely skilled software developers and develop maliciuos code are called what?
A. Skilled malicious code programmers
B. Script kiddies
A. Skilled malicious code programmers
A person that uses existing and well known techniques and programs or scripts are called what?
A. Skilled malicious code programmers
B. Script kiddies
B. Script kiddies
Macro virus uses what?
script functionality
This virus is stored is stored in the MBR and another location in the system.
master boot record (MBR) virus
This virus type infects executable files and triggers when the OS tries to execute them.
File infector virus
Why are there fewer UNIX viruses?
they are developed on entirely different kernels make it difficult to write a virus that would impact a large number of UNIX systems
Signature based antivirus works how?
Use a database of known signatures to find a virus
A virus that uses more than 1 propagation technique is called what?
A. Stealth
B. Multipart
C. Hidden
D. Rootkit
B. Multipart
What type of virus hides by tampering with the OS?
A. Stealth
B. Multipart
C. Hidden
D. Polymorphic
A. Stealth
This virus modifies its code as it moves from system to system.
A. Stealth
B. Multipart
C. Polymorphic
D. Rootkit
C. Polymorphic
This virus encrypts their code with different cryptographic keys to avoid detection.
A. Stealth
B. Encrypted
C. Polymorphic
D. Rootkit
B. Encrypted
What is a logic bomb virus?
It lies dormant until a specific trigger is met..Can be time or a particular action being performed
What time of virus looks benign but is really malicious?
Trojan Horse
What is a worm?
Malicious code that can self propagate.